Escolar Documentos
Profissional Documentos
Cultura Documentos
Awareness Course
Presented by:
Protecting Your
Kids
Protecting your children means taking action
Step #1:
Start Æ Search
Host-based software
Network-based solution
Examples
Net Nanny
CYBERsitter
CyberPatrol
Pros
Easy to install
No extra hardware needed
Cons
Need to go to each PC to check logs (?)
Easy to turn-off or bypass
Proxy
Data Data
CNN.com
User
Examples
Ubuntu Christian Edition
Futures Inc. YoungMinds
Pros
Difficult to bypass
Central monitoring available
Cons
Need extra piece of hardware
Limited functionality
Detect
Monitor activity (high-tech and low-tech)
Review logs / history files
Respond
Don’t overreact…sometimes
it’s not as bad as it looks
Use your information to
prevent something worse.